Search Results - (( variable detection learning algorithm ) OR ( data optimization method algorithm ))

Refine Results
  1. 1

    Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis by Adnani, Seyedeh Atena

    Published 2011
    “…In this system,similar insolvent system, three methods including one variable at a time, Taguchi method and ANN were used for optimization and prediction of percentage of conversion. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Pure intelligent monitoring system for steam economizer trips by Basim Ismail F., Hamzah Abed K., Singh D., Shakir Nasif M.

    Published 2023
    “…Economizers; Failure (mechanical); Fault detection; Knowledge acquisition; Learning algorithms; Learning systems; Neural networks; Plant shutdowns; Steam; Thermoelectric power plants; Extreme learning machine; Fault detection and diagnosis systems; Intelligent modeling; Intelligent monitoring systems; Network methodologies; Operational conditions; Operational variables; Thermal power plants; Steam power plants…”
    Conference Paper
  3. 3

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm by Ahmadi, Seyedeh Parisa

    Published 2018
    “…Various artificial neural network (ANN) architectures were applied to the datasets to verify the proficiency of various combinations of input variables, learning optimization methods and different numbers of neurons on the hidden layer by MATLAB 2014a software. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  6. 6

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  7. 7

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…These two models are based on topological placement method. DM is optimized using genetic algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2024
    “…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Application of Optimization Methods for Solving Clustering and Classification Problems by Shabanzadeh, Parvaneh

    Published 2011
    “…In this study we show how to apply a particular class of optimization methods known as pattern search methods to address these challenges. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14

    Data-Driven control based on marine predators algorithm for optimal tuning of the wind plant by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Helmi, Suid, Mohd Riduwan, Ghazali

    Published 2022
    “…Comparative results alongside other existing metaheuristic-based algorithms further confirmed excellence of the proposed method through its superior performance against the slime mould algorithm (SMA), multi-verse optimizer (MVO), sine-cosine algorithm (SCA), grey wolf optimizer (GWO), and safe experimentation dynamics (SED) algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost by Chen, Suihai, Bong, Chih How, Chiu, Po Chan

    Published 2024
    “…PSO-EBGWO is used to optimize the parameters of the CatBoost model. In this method, the Gray Wolf optimized algorithm (EBGWO) is further optimized by particle swarm optimization (PSO), and when combined with it, the convergence performance of the model is improved, the parameters of the model are reduced, and the model is simplified. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Data clustering using the bees algorithm by Pham, D.T, Otri, S., Afify, A., Mahmuddin, Massudi, Al-Jabbouli, H.

    Published 2007
    “…The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    An improved K-nearest neighbour with grasshopper optimization algorithm for imputation of missing data by Zainal Abidin, Nadzurah, Ismail, Amelia Ritahani

    Published 2021
    “…Thus, this paper proposes a novel method for imputation of missing data, named KNNGOA, which optimized the KNN imputation technique based on the grasshopper optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Parameter estimation in double exponential smoothing using genetic algorithm / Foo Fong Yeng, Lau Gee Choon and Zuhaimy Ismail by Foo, Fong Yeng, Lau, Gee Choon, Ismail, Zuhaimy

    Published 2014
    “…Exponential smoothing is a simple extrapolative method that seeks to identify pattern of past data. …”
    Get full text
    Get full text
    Research Reports